/macosx-10.10.1/Security-57031.1.35/Security/include/security_utilities/ |
H A D | kq++.cpp | 45 unsigned KQueue::operator () (const KEvent *updates, unsigned updateCount, argument 48 int rc = ::kevent64(mQueue, updates, updateCount, events, eventCount, 0, timeout);
|
H A D | kq++.h | 46 unsigned operator () (const KEvent *updates, unsigned updateCount, KEvent *events, unsigned eventCount,
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_utilities/lib/ |
H A D | kq++.cpp | 45 unsigned KQueue::operator () (const KEvent *updates, unsigned updateCount, argument 48 int rc = ::kevent64(mQueue, updates, updateCount, events, eventCount, 0, timeout);
|
H A D | kq++.h | 46 unsigned operator () (const KEvent *updates, unsigned updateCount, KEvent *events, unsigned eventCount,
|
/macosx-10.10.1/Security-57031.1.35/Security/include/security_keychain/ |
H A D | SecItemPriv.h | 288 CFArrayRef _SecKeychainSyncUpdateKeyParameter(CFDictionaryRef updates, CFErrorRef *error); 289 CFArrayRef _SecKeychainSyncUpdateCircle(CFDictionaryRef updates, CFErrorRef *error); 290 CFArrayRef _SecKeychainSyncUpdateMessage(CFDictionaryRef updates, CFErrorRef *error);
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/Security/ |
H A D | SecItemPriv.h | 288 CFArrayRef _SecKeychainSyncUpdateKeyParameter(CFDictionaryRef updates, CFErrorRef *error); 289 CFArrayRef _SecKeychainSyncUpdateCircle(CFDictionaryRef updates, CFErrorRef *error); 290 CFArrayRef _SecKeychainSyncUpdateMessage(CFDictionaryRef updates, CFErrorRef *error);
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/lib/ |
H A D | SecItemPriv.h | 288 CFArrayRef _SecKeychainSyncUpdateKeyParameter(CFDictionaryRef updates, CFErrorRef *error); 289 CFArrayRef _SecKeychainSyncUpdateCircle(CFDictionaryRef updates, CFErrorRef *error); 290 CFArrayRef _SecKeychainSyncUpdateMessage(CFDictionaryRef updates, CFErrorRef *error);
|
/macosx-10.10.1/mDNSResponder-561.1.1/mDNSShared/ |
H A D | dnsextd.conf | 10 // dynamic zone that will be accepting Wide-Area Bonjour DNS updates. 23 // network, you might allow anyone to perform updates. To do that, you just 24 // permit any and all updates coming from dnsextd on the same machine: 30 // you'll want to limit updates to only users with keys. For example, 32 // perform updates in your dynamic zone, like this:
|
/macosx-10.10.1/Security-57031.1.35/Security/sec/Security/ |
H A D | SecItemPriv.h | 339 CFArrayRef _SecKeychainSyncUpdateKeyParameter(CFDictionaryRef updates, CFErrorRef *error); 340 CFArrayRef _SecKeychainSyncUpdateCircle(CFDictionaryRef updates, CFErrorRef *error); 341 CFArrayRef _SecKeychainSyncUpdateMessage(CFDictionaryRef updates, CFErrorRef *error);
|
/macosx-10.10.1/Security-57031.1.35/Security/sec/SOSCircle/SecureObjectSync/ |
H A D | SOSTransport.h | 9 CF_RETURNS_RETAINED CFMutableArrayRef SOSTransportDispatchMessages(SOSAccountRef account, CFDictionaryRef updates, CFErrorRef *error);
|
H A D | SOSTransport.c | 201 static void showWhatWasHandled(CFDictionaryRef updates, CFMutableArrayRef handledKeys) { argument 206 CFDictionaryForEach(updates, ^(const void *key, const void *value) { 216 secnotice("updates", "Updates [%ld]: %@\n", CFDictionaryGetCount(updates), updateStr); 217 secnotice("updates", "Handled [%ld]: %@\n", CFArrayGetCount(handledKeys), handledKeysStr); 218 // secnotice("updates", "Updates: %@\n", updates); 219 // secnotice("updates", "Handled: %@\n", handledKeys); 226 CFMutableArrayRef SOSTransportDispatchMessages(SOSAccountRef account, CFDictionaryRef updates, CFErrorRef *error){ argument 230 if(CFDictionaryContainsKey(updates, kSOSKVSAccountChangedKe [all...] |
H A D | SOSTransportCircleKVS.c | 14 static bool SOSTransportCircleKVSUpdateRetirementRecords(SOSTransportCircleKVSRef transport, CFDictionaryRef updates, CFErrorRef* error); 124 static bool SOSTransportCircleKVSUpdateRetirementRecords(SOSTransportCircleKVSRef transport, CFDictionaryRef updates, CFErrorRef* error){ argument 127 if (SOSTransportCircleKVSUpdateKVS((SOSTransportCircleRef)transport, updates, &updateError)){ 131 CFSTR("update parameters key failed [%@]"), updates);
|
H A D | SOSAccount.h | 132 void SOSTransportEachMessage(SOSAccountRef account, CFDictionaryRef updates, CFErrorRef *error); 177 bool SOSAccountHandleParametersChange(SOSAccountRef account, CFDataRef updates, CFErrorRef *error);
|
/macosx-10.10.1/Security-57031.1.35/Security/sec/SOSCircle/CKBridge/ |
H A D | SOSCloudKeychainClient.h | 100 CF_RETURNS_RETAINED CFArrayRef SOSCloudKeychainHandleUpdateKeyParameter(CFDictionaryRef updates); 101 CF_RETURNS_RETAINED CFArrayRef SOSCloudKeychainHandleUpdateCircle(CFDictionaryRef updates); 102 CF_RETURNS_RETAINED CFArrayRef SOSCloudKeychainHandleUpdateMessage(CFDictionaryRef updates);
|
H A D | SOSCloudKeychainClient.c | 591 CF_RETURNS_RETAINED CFArrayRef SOSCloudKeychainHandleUpdateKeyParameter(CFDictionaryRef updates) argument 596 result = ((CloudItemsChangedBlock)cTransportRef->itemsChangedBlock)(updates); 600 CF_RETURNS_RETAINED CFArrayRef SOSCloudKeychainHandleUpdateCircle(CFDictionaryRef updates) argument 605 result = ((CloudItemsChangedBlock)cTransportRef->itemsChangedBlock)(updates); 609 CF_RETURNS_RETAINED CFArrayRef SOSCloudKeychainHandleUpdateMessage(CFDictionaryRef updates) argument 614 result = ((CloudItemsChangedBlock)cTransportRef->itemsChangedBlock)(updates);
|
/macosx-10.10.1/Security-57031.1.35/Security/sec/securityd/ |
H A D | SOSCloudCircleServer.h | 76 CF_RETURNS_RETAINED CFArrayRef SOSCCHandleUpdateKeyParameter(CFDictionaryRef updates); 77 CF_RETURNS_RETAINED CFArrayRef SOSCCHandleUpdateCircle(CFDictionaryRef updates); 78 CF_RETURNS_RETAINED CFArrayRef SOSCCHandleUpdateMessage(CFDictionaryRef updates);
|
H A D | SecItemServer.h | 49 CF_RETURNS_RETAINED CFArrayRef _SecServerKeychainSyncUpdateKeyParameter(CFDictionaryRef updates, CFErrorRef *error); 50 CF_RETURNS_RETAINED CFArrayRef _SecServerKeychainSyncUpdateCircle(CFDictionaryRef updates, CFErrorRef *error); 51 CF_RETURNS_RETAINED CFArrayRef _SecServerKeychainSyncUpdateMessage(CFDictionaryRef updates, CFErrorRef *error);
|
H A D | SOSCloudCircleServer.c | 527 secnotice("updates", "Requesting Ensure Peer Registration."); 559 secerror("Error handling updates: %@", error); 759 secnotice("updates", "Setting credentials for %@", user_label); // TODO: remove this notice 765 secnotice("updates", "EnsureFreshParameters/SOSAccountAssertUserCredentials error: %@", *block_error); 1113 secnotice("updates", "Request for registering peers"); 1142 secnotice("updates", "SOSAccountSyncWithAllPeers failed because device is locked; letting CloudKeychainProxy know"); 1166 CF_RETURNS_RETAINED CFArrayRef SOSCCHandleUpdateKeyParameter(CFDictionaryRef updates) 1170 (account) ? (result = SOSCloudKeychainHandleUpdateKeyParameter(updates)) : (result = CFArrayCreateMutableForCFTypes(kCFAllocatorDefault)); 1174 CF_RETURNS_RETAINED CFArrayRef SOSCCHandleUpdateCircle(CFDictionaryRef updates) 1178 (account) ? (result = SOSCloudKeychainHandleUpdateKeyParameter(updates)) [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/sec/securityd/Regressions/ |
H A D | SOSTransportTestTransports.c | 21 static void SOSTransportMessageTestAddBulkToChanges(SOSTransportMessageTestRef transport, CFDictionaryRef updates); 38 static void SOSTransportCircleTestAddBulkToChanges(SOSTransportCircleTestRef transport, CFDictionaryRef updates); 349 static void SOSTransportCircleTestAddBulkToChanges(SOSTransportCircleTestRef transport, CFDictionaryRef updates){ argument 352 transport->changes = CFDictionaryCreateMutableCopy(kCFAllocatorDefault, CFDictionaryGetCount(updates), updates); 356 CFDictionaryForEach(updates, ^(const void *key, const void *value) { 396 __unused static bool SOSTransportCircleTestUpdateRetirementRecords(SOSTransportCircleTestRef transport, CFDictionaryRef updates, CFErrorRef* error){ argument 399 if (SOSTransportCircleTestSendChanges((SOSTransportCircleTestRef)transport, updates, &updateError)){ 403 CFSTR("update parameters key failed [%@]"), updates); 536 static void SOSTransportMessageTestAddBulkToChanges(SOSTransportMessageTestRef transport, CFDictionaryRef updates){ argument [all...] |
/macosx-10.10.1/PowerManagement-494.1.2/pmconfigd/ |
H A D | PMAssertionLog.c | 520 CFMutableArrayRef updates = NULL; local 592 updates = CFArrayCreateMutable(NULL, 0, &kCFTypeArrayCallBacks); 593 if (updates == NULL) { 601 CFArrayAppendArray(updates, activity.log, range); 614 CFArrayAppendArray(updates, activity.log, range); 624 serializedLog = CFPropertyListCreateData(0, updates, 644 if (updates) 645 CFRelease(updates);
|
H A D | BatteryTimeRemaining.c | 83 // log of previous battery updates, maintained as ring buffer 1849 CFMutableArrayRef updates = NULL; local 1857 updates = CFArrayCreateMutable(NULL, 0, &kCFTypeArrayCallBacks); 1858 if (updates == NULL) { 1892 CFArrayAppendValue(updates, entry); 1906 return updates; 1913 vm_offset_t *updates, 1923 *updates = NULL; *updates_len = 0; 1964 vm_allocate(mach_task_self(), (vm_address_t *)updates, *updates_len, TRUE); 1965 if (*updates 1909 _io_ps_copy_chargelog( mach_port_t server __unused, audit_token_t token, double ts, vm_offset_t *updates, mach_msg_type_number_t *updates_len, int *rc) argument [all...] |
/macosx-10.10.1/bind9-45.101/bind9/lib/dns/include/dns/ |
H A D | client.h | 111 dns_clientupdatestate_prepare, /*%< no updates have been sent */ 112 dns_clientupdatestate_sent, /*%< updates were sent, no response */ 488 dns_namelist_t *updates, isc_sockaddrlist_t *servers, 494 dns_namelist_t *updates, isc_sockaddrlist_t *servers, 499 * Perform DNS dynamic update for 'updates' of the 'rdclass' class with 502 * 'updates' are a list of names with associated RRsets to be updated. 505 * the prerequisites of the updates. This is optional and can be NULL, in 508 * Both 'updates' and 'prerequisites' must be constructed as specified in 514 * with the first name in prerequisites or updates. 554 *\li 'updates' ! [all...] |
/macosx-10.10.1/vim-55/runtime/syntax/ |
H A D | debchangelog.vim | 22 syn match debchangelogTarget contained "\v %(frozen|unstable|%(testing|%(old)=stable)%(-proposed-updates|-security)=|experimental|%(etch|lenny)-%(backports|volatile)|%(dapper|hardy|jaunty|karmic|lucid|maverick)%(-%(security|proposed|updates|backports|commercial|partner))=)+"
|
/macosx-10.10.1/Security-57031.1.35/Security/sec/ipc/ |
H A D | server.c | 474 CFDictionaryRef updates = SecXPCDictionaryCopyDictionary(event, kSecXPCKeyQuery, &error); local 475 if (updates) { 476 CFArrayRef result = _SecServerKeychainSyncUpdateKeyParameter(updates, &error); 480 CFReleaseNull(updates); 485 CFDictionaryRef updates = SecXPCDictionaryCopyDictionary(event, kSecXPCKeyQuery, &error); local 486 if (updates) { 487 CFArrayRef result = _SecServerKeychainSyncUpdateCircle(updates, &error); 491 CFReleaseNull(updates); 496 CFDictionaryRef updates = SecXPCDictionaryCopyDictionary(event, kSecXPCKeyQuery, &error); local 497 if (updates) { [all...] |
/macosx-10.10.1/OpenLDAP-499.27/OpenLDAP/servers/slapd/ |
H A D | passwd.c | 411 authPolicyAllowed = APAuthenticationAllowed(userpolicyinfodict, true, &cferr, ^(CFArrayRef keys){ return odusers_accountpolicy_retrievedata(&policyData, keys, &op->o_conn->c_sasl_dn); }, ^(CFDictionaryRef updates){ odusers_accountpolicy_updatedata( updates, &op->o_conn->c_sasl_dn ); }); 425 ^(CFDictionaryRef updates){ odusers_accountpolicy_updatedata( updates, &op->o_req_dn ); });
|